Skip to main content
guest
Join
|
Help
|
Sign In
ACG 6415
Home
guest
|
Join
|
Help
|
Sign In
ACG 6415
Wiki Home
Projects
Recent Changes
Pages and Files
Members
Home
Syllabus - Spring 2018
Schedule - Spring 2018
Class Readings
Class Slides
Access Control Simulation
Course Videos
TYU Solutions
GAO Reports
Security Certifications
Resources
Frameworks & Standards
Threat Statistics
Phishing
Security in the News
Technology Radar
AIS/CPA Exam
Wiki Information
Schedule - Summer D 2014
Edit
8
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Summer D 2014 Schedule
Date
Chapter
Coverage
Readings
Assignment
Due Date
05/12/2014
Introduction
Readings
Read the
Threat Environment
articles and be prepared to discuss in class.
05/14/2014
Readings
COSO, COBIT, ERM
Using COSO to Assess IT Controls
(Journal of Accountancy, May 2014)
From the
Frameworks & Standards
page, read:
Internal Control - Integrated Framework (1992)
Internal Control - Integrated Framework (2011 Exposure Draft)
coso_draft_internal control framework.pdf
Enterprise Risk Management - Integrated Framework (2004)
COBIT 4.1
CobiT_4.1.pdf
05/19/2014
Chapter 1
The Threat Environment
05/21/2014
Chapter 2
Planning & Policy
We will be discussing an alternative Risk Assessment method OCTAV Alegro, you can read more
here
.
05/26/2014
No Class
05/28/2014
Module A
Networking Concepts
06/02/2014
Chapter 3
Cryptography
Read the
Cryptography Readings
from the
Class Readings
page
06/04/2014
Chapter 4
Secure Networks
06/05/2014
to
06/08/2014
Exam 1 (Chapter 1-4, Module A, Readings)
06/09/2014
Chapter 5
Access Controls
06/11/2014
Readings
Passwords
Read the required readings from the Password section of the
Class Readings
Access Control Simulation Report
06/16/2014
06/16/2014
Chapter 6
Firewalls
06/18/2014
Chapter 7
Host Hardening
06/23/2014
Chapter 8
Application Security
Read the required Application Hardening articles section of the
Class Readings
06/25/2014
Chapter 9 & 10
Data Protection & Incident and Disaster Response
Cybersecurity's Maginot Line: A real-world assessment of the defense-in-depth model by Mandiant, May 2014
fireeye-real-world-assessment.pdf
Details
Download
2 MB
06/30/2014
Readings
SOX IT Readings
This article discusses the Board's role in cybersecurity from a governance perspective:
TCB_DN-V6N6-141.pdf
Details
Download
450 KB
(Clarke and Olcott, 2014)Read the required readings from the IT Control and SOX section of the
Class Readings
Security in the News
07/02/2014
07/02/2014
Readings
SEC Readings and Misc.
Cyberattack's abound yet companies tell SEC losses are few
By
Chris Strohm, Eric Engleman and Dave Michaels
-
Apr 3, 2013)
Companies Hacked by Chinese Didn’t Disclose Attacks to Investors
By
By Chris Strohm, Dave Michaels and Sonja Elmquist - May 21, 2014)
CF Disclosure Guidance: Topic No. 2
S.E.C. (
This guidance provides the Division of Corporation Finance's views regarding disclosure obligations relating to cybersecurity risks and cyber incidents)
SEC Cybersecurity Roundtable Archive Webcast
SEC OCIE Cybersecurity Initiative (April 15, 2014)
Cybersecurity Risk Alert & Appendix - 4.15.14.pdf
Details
Download
295 KB
AICPA Top 5 Cybercrimes (2013)
Top-5-CyberCrimes.pdf
Details
Download
5 MB
ERM for cloud computing (COSO)
2012 Chan.pdf
Details
Download
6 MB
07/07/2014 to 07/11/2014
Exam 2 (Chapter 5-10, Readings)
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
Summer D 2014 Schedule
From the Frameworks & Standards page, read:
to
06/08/2014